Netiq® Cloudaccess and Mobileaccess Installation and Configuration Guide

Total Page:16

File Type:pdf, Size:1020Kb

Netiq® Cloudaccess and Mobileaccess Installation and Configuration Guide NetIQ® CloudAccess and MobileAccess Installation and Configuration Guide September 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R. 227.7202-4 (for Department of Defense (DOD) acquisitions) and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions), the government’s rights in the software and documentation, including its rights to use, modify, reproduce, release, perform, display or disclose the software or documentation, will be subject in all respects to the commercial license rights and restrictions provided in the license agreement. © 2014 NetIQ Corporation. All Rights Reserved. For information about NetIQ trademarks, see https://www.netiq.com/company/legal/. About this Book and the Library The Installation and Configuration Guide provides conceptual information about the NetIQ CloudAccess (CloudAccess) and NetIQ MobileAccess (MobileAccess) products. This book contains configuration information for the appliance and for the SaaS applications. NOTE: Many of the topics in this guide are applicable to both CloudAccess and MobileAccess users. However, certain features of the CloudAccess product are not included with the MobileAccess license. Those product features that are visible to MobileAccess users, but are licensed only to CloudAccess users, are clearly marked in this guide. Intended Audience This book provides information for individuals responsible for deploying and configuring the appliance and configuring application connectors. Other Information in the Library The library provides the following information resources: Help Provides context-sensitive information and step-by-step guidance for common tasks, as well as definitions for fields in windows of the administration console. About this Book and the Library 3 4 NetIQ® CloudAccess and MobileAccess Installation and Configuration Guide About NetIQ Corporation We are a global, enterprise software company, with a focus on the three persistent challenges in your environment: Change, complexity and risk—and how we can help you control them. Our Viewpoint Adapting to change and managing complexity and risk are nothing new In fact, of all the challenges you face, these are perhaps the most prominent variables that deny you the control you need to securely measure, monitor, and manage your physical, virtual, and cloud computing environments. Enabling critical business services, better and faster We believe that providing as much control as possible to IT organizations is the only way to enable timelier and cost effective delivery of services. Persistent pressures like change and complexity will only continue to increase as organizations continue to change and the technologies needed to manage them become inherently more complex. Our Philosophy Selling intelligent solutions, not just software In order to provide reliable control, we first make sure we understand the real-world scenarios in which IT organizations like yours operate—day in and day out. That's the only way we can develop practical, intelligent IT solutions that successfully yield proven, measurable results. And that's so much more rewarding than simply selling software. Driving your success is our passion We place your success at the heart of how we do business. From product inception to deployment, we understand that you need IT solutions that work well and integrate seamlessly with your existing investments; you need ongoing support and training post-deployment; and you need someone that is truly easy to work with—for a change. Ultimately, when you succeed, we all succeed. Our Solutions Identity & Access Governance Access Management Security Management Systems & Application Management Workload Management Service Management About NetIQ Corporation 5 Contacting Sales Support For questions about products, pricing, and capabilities, contact your local partner. If you cannot contact your partner, contact our Sales Support team. Worldwide: www.netiq.com/about_netiq/officelocations.asp United States and Canada: 1-888-323-6768 Email: [email protected] Web Site: www.netiq.com Contacting Technical Support For specific product issues, contact our Technical Support team. Worldwide: www.netiq.com/support/contactinfo.asp North and South America: 1-713-418-5555 Europe, Middle East, and Africa: +353 (0) 91-782 677 Email: [email protected] Web Site: www.netiq.com/support Contacting Documentation Support Our goal is to provide documentation that meets your needs. The documentation for this product is available on the NetIQ website in HTML and PDF formats on a page that does not require you to log in. If you have suggestions for documentation improvements, click comment on this topic at the bottom of any page in the HTML version of the documentation posted at www.netiq.com/ documentation. You can also email [email protected]. We value your input and look forward to hearing from you. Contacting the Online User Community NetIQ Communities, the NetIQ online community, is a collaborative network connecting you to your peers and NetIQ experts. By providing more immediate information, useful links to helpful resources, and access to NetIQ experts, NetIQ Communities helps ensure you are mastering the knowledge you need to realize the full potential of IT investments upon which you rely. For more information, visit community.netiq.com. 6 NetIQ® CloudAccess and MobileAccess Installation and Configuration Guide Contents About this Book and the Library 3 About NetIQ Corporation 5 1 Overview of NetIQ CloudAccess 13 1.1 Inherent Problems Using SaaS Applications . .13 1.2 The Solution That CloudAccess Provides . 14 1.3 How CloudAccess Works. 15 1.4 How CloudAccess Fits into Your Network . 15 1.5 Understanding Product Licensing . 16 2 Installing the Appliance 17 2.1 Installation and Configuration Checklist . 17 2.2 Product Requirements . 18 2.3 Identity Source Requirements . 20 2.3.1 Active Directory Requirements . 21 2.3.2 eDirectory Requirements . .21 2.3.3 JDBC Requirements . 22 2.3.4 Self-Service User Store Requirements . 27 2.4 Appliance Installation Worksheet . 28 2.5 Deploying the Appliance . 28 2.6 Upgrading Your Environment. 29 2.7 Initializing the Appliance. 29 3 Configuring the Appliance 31 3.1 Accessing the Administration Console. 31 3.2 Getting Started . 32 3.3 Registering the Appliance . 32 3.4 Configuring Network Options . 33 3.4.1 Configuring the Forward Proxy . 33 3.4.2 Configuring the Second Network Interface . 34 3.4.3 Configuring the Routing Table . 34 3.4.4 A Sample Network Configuration. 35 3.5 Changing the Certificates on the Appliance . 35 3.6 Verifying the Identity Source User Attributes . 36 3.7 Configuring Additional Identity Sources . 36 3.7.1 Configuring Self-Service Registration and Password Management . 37 3.7.2 Configuring Additional Identity Sources. 42 3.7.3 Configuring SAML 2.0 Inbound Identity Sources. 42 3.8 Configuring Roles Management. 43 3.8.1 Defining the Role Types . 43 3.8.2 Assigning Roles to Users. 44 3.9 Configuring Clustering . 44 3.9.1 Advantages of Clustering. 44 3.9.2 Managing Nodes in the Cluster . 45 3.9.3 Configuring an L4 Switch for Clustering . 46 3.9.4 Configuring an L4 Switch for Email Proxy . 47 3.10 Configuring Integrated Windows Authentication with Kerberos . 49 Contents 7 3.10.1 Configuring the Kerberos User in Active Directory . 49 3.10.2 Configuring the Appliance to Use Integrated Windows Authentication with Kerberos. 50 3.10.3 Configuring User Browsers . .50 3.11 Configuring Google reCAPTCHA. 50 3.11.1 Requirements for reCAPTCHA . 51 3.11.2 Configuring Intrusion Detection for Failed Logins . 51 3.11.3 Configuring a Google reCAPTCHA Account . 52 3.11.4 Configuring the reCAPTCHA Tool .
Recommended publications
  • Megaraid 6Gb/S SAS RAID Controllers Users Guide
    USER’S GUIDE MegaRAID® 6Gb/s SAS RAID Controllers November 2009 41450-02 Rev. B This document contains proprietary information of LSI Corporation. The information contained herein is not to be used by or disclosed to third parties without the express written permission of an officer of LSI Corporation. LSI products are not intended for use in life-support appliances, devices, or systems. Use of any LSI product in such applications without written consent of the appropriate LSI officer is prohibited. Purchase of I2C components of LSI Corporation, or one of its sublicensed Associated Companies, conveys a license under the Philips I2C Patent Rights to use these components in an I2C system, provided that the system conforms to the I2C standard Specification as defined by Philips. Document 41450-02 Rev. B, November 2009. This document describes the current versions of the LSI Corporation MegaRAID® SAS RAID controllers and will remain the official reference source for all revisions/releases of these products until rescinded by an update. LSI Corporation reserves the right to make changes to any products herein at any time without notice. LSI does not assume any responsibility or liability arising out of the application or use of any product described herein, except as expressly agreed to in writing by LSI; nor does the purchase or use of a product from LSI convey a license under any patent rights, copyrights, trademark rights, or any other of the intellectual property rights of LSI or third parties. Copyright © 2009 by LSI Corporation. All rights reserved. TRADEMARK ACKNOWLEDGMENT LSI, the LSI logo design, Fusion-MPT, and MegaRAID are trademarks or registered trademarks of LSI Corporation.
    [Show full text]
  • Govt Linux Appreciation Day 09/18/01
    John Terpstra Vice President, Technology Caldera International, Inc. The Maturation of Linux Are we there yet? Slide 2 The Road to Maturity . Self-Discipline . Acceptance of Responsibility . Accountability for Actions Slide 3 MarketMarket Share 1999 Worldwide Market for Server Operating Environments N = 5.475 Million Shipments Other NOS Netware 2.6% 19.4% NT Server 38.1% Unix & Linux 39.9% Source: IDC Slide 4 Linux Server Applications Primary Function of Linux Servers Installed at U.S. Sites, 1999 Web Server 42.1% Overwhelming File/Print Server 26.0% appeal as a Web Email Server 23.2% DNS 15.3% server – over 50% Firewall/Proxy/Cache 14.7% of all Internet Internet/Intranet Server 12.6% Web Servers run Database 10.5% on Apache and Application Development 8.4% Application server 6.3% 60% of all Apache Experimental/Testing 6.3% Servers run on Router/Gateway 5.8% Linux Networking 2.6% Systems Mgmt. 2.1% Backup 2.1% VPN 1.6% Technical Apps 1.1% Other 1.1% 0% 10% 20% 30% 40% 50% Source: IDC N=195 Slide 5 Where Are We? 1. File and Print – 10 Million servers - Major application - Samba 2. Web Serving – 18 Million servers - Major application - Apache 3. Proxy Serving - - Major application – Squid Linux plays a major role hosting each application Slide 6 A Competitive View – Then http://www.microsoft.com/windows/serverappliance/kempin.asp Date: Nov 9, 2000 But it is true that Linux are actually rapidly increasing their market share in the US also. Doesn't this pose a threat? "Linux is simply a fad that has been generated by the media and is destined to fall by the wayside in time.
    [Show full text]
  • SCO Office MAIL SERVER
    SCO_office_DS2.qxd 1/8/03 9:21 AM Page 1 SCOoffice MAIL SERVER SCOoffice Mail Server combines the Microsoft Outlook® compatibility users need with the built-in reliability and ease of use customers expect, and is priced at a fraction of the cost of Microsoft Exchange™. The result is a rock solid, affordable, and complete mail and collaboration solution. COMPATIBLE SCOoffice MAIL SERVER 2.0 FEATURES SCOoffice Mail Server is specifically designed to COMPATIBLE be compatible with Microsoft Outlook and other popular • Advanced, scalable, full-featured Internet mail server mail clients. It comes pre-configured to support mail, enhanced address book, and busy-free calendar features of • Supports Internet standard email protocols including popular messaging readers. As a result, businesses can deliver SMTP, POP3, and IMAP4 complete messaging and time management without any user • Supports popular mail clients, including Microsoft Outlook retraining or desktop software updates. 2000, Outlook XP, Outlook 98, Outlook Express, Eudora, When used with Microsoft Outlook, SCOoffice Mail Server Netscape Communicator 4.7, Kmail and others adds essential collaboration with shared calendar, folders, and • Internet Messaging Program (IMP) web-based email client global address book features. Further, the simple Outlook for complete web-based mail interface enables users to quickly set up shared resources • Free/Busy calendaring services for Microsoft Outlook and without technical assistance. Ximian Evolution • Integrates with popular third-party virus filtering tools RELIABLE • Supports well known and trusted commercial solutions for Known worldwide for providing key infrastructure for the backup, FAX messaging, and virus protection day-to-day business operations of internationally recognized • Support remote, sometimes connected clients via IMAP4 organizations, such as McDonald’s and NASDAQ, SCO has and Web-based Mail Client built its reputation around the reliability of its software.
    [Show full text]
  • Case COMP/C-3/37.792 Microsoft)
    EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 21.4.2004 C(2004)900 final COMMISSION DECISION of 24.03.2004 relating to a proceeding under Article 82 of the EC Treaty (Case COMP/C-3/37.792 Microsoft) (ONLY THE ENGLISH TEXT IS AUTHENTIC) (Text with EEA relevance) EN EN COMMISSION DECISION of 24.03.2004 relating to a proceeding under Article 82 of the EC Treaty (Case COMP/C-3/37.792 Microsoft) (ONLY THE ENGLISH TEXT IS AUTHENTIC) (Text with EEA relevance) THE COMMISSION OF THE EUROPEAN COMMUNITIES, Having regard to the Treaty establishing the European Community, Having regard to Council Regulation No 17 of 6 February 1962, First Regulation implementing Articles 85 and 86 of the Treaty1, and in particular Article 3 and Article 15(2) thereof, Having regard to the complaint lodged by Sun Microsystems, Inc. on 10 December 1998, alleging infringements of Article 82 of the Treaty by Microsoft and requesting the Commission to put an end to those infringements, Having regard to the Commission decision of 1 August 2000 to initiate proceedings in Case IV/C-3/37.345, Having regard to the Commission decision of 29 August 2001 to initiate proceedings in this case, and to join the findings in Case IV/C-3/37.345 to the procedure followed under this case, Having given the undertaking concerned the opportunity to make known their views on the objections raised by the Commission pursuant to Article 19(1) of Regulation No 17 and Commission Regulation (EC) No 2842/98 of 22 December 1998 on the hearing of parties in certain proceedings under Articles 85 and 86 of the EC Treaty2, Having regard to the final report of the hearing officer in this case, After consulting the Advisory Committee on Restrictive Practices and Dominant Positions, 1 OJ 13, 21.2.1962, p.
    [Show full text]
  • Hitachi Infrastructure Analytics Advisor V4.2.0 Open Source Software Packages
    Hitachi Infrastructure Analytics Advisor V4.2.0 Open Source Software Packages Contact Information: Hitachi Infrastructure Analytics Advisor Project Manager Hitachi Vantara Corporation 2535 Augustine Drive Santa Clara, California 95054 Name of Product/Product Version License Component ASM 3.3.1 BSD 3-Clause "New" or "Revised" License ASM* 3.3.1(modif BSD 3-Clause "New" or "Revised" License ied) Algorithm::Diff - Compute 1.1903 GNU General Public License Version `intelligent' differences between 1 or Artistic License two files / lists Apache Click 2.3.0 Apache License, Version 2.0 BSD 3-Clause "New" or "Revised" License Creative Commons Attribution 2.5 Generic The License of "Prototype JavaScript framework" The MIT License Apache Commons BCEL 5.1 Apache BCEL License Apache Commons CLI 1.1 Apache License, Version 2.0 Apache Commons Codec 1.10 Apache License, Version 2.0 Apache Commons Collections 3.2 Apache License, Version 2.0 Apache Commons Collections 4.1 Apache License, Version 2.0 Apache Commons Compress 1.0 Apache License, Version 2.0 Apache Commons Email 1.5 Apache License, Version 2.0 Name of Product/Product Version License Component Apache HTTP Server 2.4.34 Apache License, Version 2.0 BSD 3-Clause "New" or "Revised" License GNU General Public License, Version 3 with Autoconf exception Public Domain or Free License without conditions The License by "Bell Communications Research, Inc. (Bellcore)" The License by "Carnegie Mellon University" The License by "RSA Data Security, Inc." The License of "RSA Data Security, Inc. MD4 Message-Digest Algorithm" The License of "RSA Data Security, Inc.
    [Show full text]
  • Open Source Used in Asyncos 11.1 for Cisco Email Security Appliances
    Open Source Used In AsyncOS 11.1 for Cisco Email Security Appliances Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: 78EE117C99-161543810 Open Source Used In AsyncOS 11.1 for Cisco Email Security Appliances 1 This document contains licenses and notices for open source software used in this product. With respect to the free/open source software listed in this document, if you have any questions or wish to receive a copy of any source code to which you may be entitled under the applicable free/open source license(s) (such as the GNU Lesser/General Public License), please contact us at [email protected]. In your requests please include the following reference number 78EE117C99-161543810 Contents 1.1 AnyEvent 5.34 1.1.1 Available under license 1.2 Apache Commons Lang 2.0 1.2.1 Notifications 1.2.2 Available under license 1.3 Apache Commons: Logging 1.0.3 1.3.1 Notifications 1.3.2 Available under license 1.4 Aquarium 2.2.1 1.4.1 Available under license 1.5 Archive::Zip 1.30 1.5.1 Available under license 1.6 B::Deobfuscate 0.20 1.6.1 Available under license 1.7 B::Deobfuscate 0.10 1.7.1 Available under license 1.8 B::Keywords 0.06 1.8.1 Available under license 1.9 B::Keywords 1.10 1.9.1 Available under license 1.10 berkeleydb 1.85/1.86 1.11 BerkeleyDB-perl 0.49 1.11.1 Available under license 1.12 binutils 2.20.51.0.2 :5.44.el6 1.12.1 Available under license 1.13 Boost 1.41
    [Show full text]
  • SCO Openserver Handbook Changing the Default Editor
    SCO OpenServer Handbook How to configure and start using an SCO OpenServer system 1983-2003 Caldera International, Inc. All rights reserved. This publication is protected under copyright laws and international treaties. 1976-2001 The Santa Cruz Operation, Inc.; 1989-1994 Acer Incorporated; 1989-1994 Acer America Corporation; 1990-1994 Adaptec, Inc.; 1993 Advanced Micro Devices, Inc.; 1990 Altos Computer Systems; 1992-1994 American Power Conversion, Inc.; 1988 Archive Corporation; 1990 ATI Technologies, Inc.; 1976-1992 AT&T; 1992-1994 AT&T Global Information Solutions Company; 1993 Berkeley Network Software Consortium; 1985-1986 Bigelow & Holmes; 1988-1991 Carnegie Mellon University; 1989-1990 Cipher Data Products, Inc.; 1985-1992 Compaq Computer Corporation; 1987-1994 Computer Associates, Inc.; 1986-1987 Convergent Technologies, Inc.; 1990-1993 Cornell University; 1985-1994 Corollary, Inc.; 1990-1994 Distributed Processing Technology; 1991 D.L.S. Associates; 1990 Free Software Foundation, Inc.; 1989-1991 Future Domain Corporation; 1994 Isogon Corporation; 1991 Hewlett-Packard Company; 1994 IBM Corporation; 1990-1993 Intel Corporation; 1989 Irwin Magnetic Systems, Inc.; 1988-1991 JSB Computer Systems Ltd.; 1989-1994 Dirk Koeppen EDV- Beratungs-GmbH; 1989-1991 Massachusetts Institute of Technology; 1985-1992 Metagraphics Software Corporation; 1980-1994 Microsoft Corporation; 1984-1989 Mouse Systems Corporation; 1989 Multi-Tech Systems, Inc.; 1991 National Semiconductor Corporation; 1990 NEC Technologies,
    [Show full text]
  • A Repository of Unix History and Evolution
    http://www.dmst.aueb.gr/dds/pubs/jrnl/2016-EMPSE-unix-history/html/unix-history.html This is an HTML rendering of a working paper draft that led to a publication. The publication should always be cited in preference to this draft using the following reference: Diomidis Spinellis. A repository of Unix History and evolution. Empirical Software Engineering, 22(3):1372–1404, 2017. (doi:10.1007/s10664-016-9445-5) This document is also available in PDF format. The final publication is available at Springer via doi:10.1007/s10664-016-9445-5. The document's metadata is available in BibTeX format. Find the publication on Google Scholar This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. Diomidis Spinellis Publications A Repository of Unix History and Evolution1 Diomidis Spinellis Abstract The history and evolution of the Unix operating system is made available as a revision management repository, covering the period from its inception in 1972 as a five thousand line kernel, to 2016 as a widely-used 27 million line system. The 1.1GB repository contains 496 thousand commits and 2,523 branch merges. The repository employs the commonly used Git version control system for its storage, and is hosted on the popular GitHub archive.
    [Show full text]
  • Caldera License
    240 West Center Street Orem, Utah 84057 801-765-4999 Fax 801-765-4481 January 23, 2002 Dear UNIX enthusiasts, Caldera International, Inc. hereby grants a fee free license that includes the rights use, modify and distribute this named source code, including creating derived binary products created from the source code. The source code for which Caldera International, Inc. grants rights are limited to the following UNIX Operating Systems that operate on the 16-Bit PDP-11 CPU and early versions of the 32-Bit UNIX Operating System, with specific exclusion of UNIX System III and UNIX System V and successor operating systems: 32-bit 32V UNIX 16 bit UNIX Versions 1, 2, 3, 4, 5, 6, 7 Caldera International, Inc. makes no guarantees or commitments that any source code is available from Caldera International, Inc. The following copyright notice applies to the source code files for which this license is granted. Copyright(C) Caldera International Inc. 2001-2002. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code and documentation must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed or owned by Caldera International, Inc. Neither the name of Caldera International, Inc.
    [Show full text]
  • Press Release Faximum Software Inc
    Press Release Faximum Software Inc. FOR IMMEDIATE RELEASE For more information, contact: Carolanne Reynolds [email protected] 604 925 3600 Faximum Announces New Fax Software for Linux and Windows FMS 2 seamlessly integrates fax with email to deliver improved security and higher user efficiency. West Vancouver, BC -- June 24 -- Faximum Software Inc., a leading developer of fax server software, announces a major new release of its Fax Messaging Server (FMS) product. FMS 2 runs on Linux, integrates with an organisation’s existing email server, and enables Windows, Mac, and Linux users to send and receive faxes as easily as (and using the same tools as) email. FMS 2: • enables users to send email to fax numbers (e.g. [email protected]) • allows users to combine email addresses and fax numbers in the same message or email group • enables users to receive their faxes in the same inbox as their email • eliminates the need to route, distribute, and file paper faxes manually • makes it easy to pick up your faxes while at home or on the road travelling • keeps confidential faxes actually confidential by eliminating the manual handling of faxes • provides print drivers for Windows enabling “What You Print is What You Fax” • can bypass the long-distance phone system when installed at branch offices reducing or eliminating toll charges for long distance faxing • has web-based administration making it easy to configure and manage without having to use cryptic shell commands or to edit configuration files “We are proud of the tight integration and ease of use that our engineers have worked hard to deliver in this new Faximum Fax Messaging Server release,” says Carolanne Reynolds, Vice President of Faximum Software Inc.
    [Show full text]
  • Design of a WBEM-Based Management System for Ubiquitous Computing Servers
    Design of a WBEM-based Management System for Ubiquitous Computing Servers So-Jung Lee1, Mi-Jung Choi1, Sun-Mi Yoo1, James W. Hong1 Hee-Nam Cho2, Chang-Won Ahn2, Sung-In Jung2 1Dept. of Computer Science and Engineering, POSTECH 2Digital Home Research Division, ETRI {annie, mjchoi, sunny81, jwkhong}@postech.ac.kr, {hncho, ahn, sijung}@etri.re.kr Abstract As the Internet evolves and wireless network technologies develop, people’s need to get a network service at anytime from anywhere is growing, and the age of ubiquitous computing is coming in earnest. A ubiquitous computing server receives and processes lots of information from various sensors in a ubiquitous computing environment and plays a role in providing various useful services. In this paper, we analyze the requirements for managing the ubiquitous computing servers based on WBEM technologies which are being standardized in DMTF. We present the design of our management system, which satisfies the requirements. We also examine and compare available WBEM implementations by performing benchmarking testing. Based on the benchmarking results, we present our choice of WBEM implementation, which is being used for implementing our ubiquitous computing server management system. 1. Introduction As the Internet continues to grow and the wired/wireless network evolves, users want to get various services at anytime and anywhere by connecting to the network. The idea used to realize this service is ubiquitous computing. Ubiquitous computing is a new paradigm for distributed interactive systems, which moves computers into the background of people's attention while using them to support their activities and interactions in the workplace and beyond.
    [Show full text]
  • Open Source Used in Asyncos 11.1 for Cisco Content Security Management Appliances
    Open Source Used In AsyncOS 11.1 for Cisco Content Security Management Appliances Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Open Source Used In AsyncOS 11.1 for Cisco Content Security Management Appliances 1 Text Part Number: 78EE117C99-185085018 Open Source Used In AsyncOS 11.1 for Cisco Content Security Management Appliances 2 This document contains licenses and notices for open source software used in this product. With respect to the free/open source software listed in this document, if you have any questions or wish to receive a copy of any source code to which you may be entitled under the applicable free/open source license(s) (such as the GNU Lesser/General Public License), please contact us at [email protected]. In your requests please include the following reference number 78EE117C99-185085018 Contents 1.1 FreeBSD Kernel 10.4 1.1.1 Available under license 1.2 IJG JPEG Image Compression 8c 1.2.1 Notifications 1.2.2 Available under license 1.3 IPMItool 1.8.9 1.3.1 Available under license 1.4 libexecinfo 1.1 :3 1.4.1 Available under license 1.5 lsof 4.85A :5 1.5.1 Notifications 1.5.2 Available under license 1.6 openldap 2.3.27 1.6.1 Available under license 1.7 PostgreSQL 7.4.2 1.7.1 Available under license 1.8 PyJWT 1.5.3 1.8.1 Available under license 1.9 python 2.6.4 1.9.1 Available under license 1.10 Sleepycat 4.4.20 1.10.1 Available under license 1.11 smartmontools 5.40 1.11.1 Available under license 1.12 sudo 1.7.4p4 1.12.1 Available under license Open Source Used In AsyncOS 11.1 for Cisco Content Security Management Appliances 3 1.13 sudo_BSD 1.7.4p4 1.13.1 Available under license 1.1 FreeBSD Kernel 10.4 1.1.1 Available under license : Apache Portable Runtime Copyright (c) 2000-2014 The Apache Software Foundation.
    [Show full text]